Results 141 to 150 of about 23,383 (317)
Whole‐bone shape of hominoid manual proximal phalanges
Abstract Functional morphologists have long noted that skeletal adaptations in primate phalanges reflect locomotor behavior. While most studies have successfully used two‐dimensional measurements to quantify general features of phalanx shape, a whole‐bone three‐dimensional analysis may better capture more subtle aspects of phalanx morphology that have ...
Deanna M. Goldstein+7 more
wiley +1 more source
Abstract Actinopterygii is a major extant vertebrate group, but limited data are available for its earliest members. Here we investigate the morphology of Devonian actinopterygians, focusing on the lower jaw. We use X‐ray computed tomography (XCT) to provide comprehensive descriptions of the mandibles of 19 species, which span the whole of the Devonian
Ben Igielman+11 more
wiley +1 more source
ABSTRACT The emergence and development of settlement mounds, also called tells, is of major interest for the analysis of socio‐economic transformations occurring in the lower Danube plain during the East European Chalcolithic period. In this context, the multiphase chronology and structural layout of tells are highly relevant indicators, but small ...
Manuel Zolchow+11 more
wiley +1 more source
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm [PDF]
Konstantinos Chalkias+2 more
openalex +1 more source
3D printing variation: Teaching and assessing hepatobiliary variants in human anatomy
Abstract Textbook anatomy depiction of the hepatobiliary tree is present in 55%–62% of the population. Misidentification of hepatobiliary variants can lead to bile duct injuries in cholecystectomies. A better understanding of variants has been cited as a key area for improvement in anatomy education.
Christian Myles+2 more
wiley +1 more source
Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack.
Rares Ifrim, Decebal Popescu
doaj +1 more source
Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography
Marc Jóye, Christophe Tymen
openalex +1 more source
Abstract This study explores the sustainable valorization of fruit waste (FW) for bioethanol production using a consolidated bioprocess (CBP) that combines fermentation and enzymatic hydrolysis in a single step. A co‐culture of Bacillus siamensis F2 (a multienzyme producer) and Candida albicans GP1 (a fermentative yeast) was employed to maximize ...
Baliram Gurunath Rathod+4 more
wiley +1 more source
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks [PDF]
An Liu, Peng Ning
openalex +1 more source
ABSTRACT Small and medium‐sized hotels (SME hotels), which constitute the majority of the global hospitality sector, face mounting pressure to align with sustainability goals. However, their transition to circular economy (CE) practices remains under‐theorised and poorly implemented, particularly in emerging economies where institutional fragility and ...
Sandeep Kumar Dey+3 more
wiley +1 more source